kmcallister / aesni-examplesView external linksLinks
Example code for the AES crypto instructions on Intel chips
☆83Dec 1, 2019Updated 6 years ago
Alternatives and similar repositories for aesni-examples
Users that are interested in aesni-examples are comparing it to the libraries listed below
Sorting:
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- A Python implementation of the SPHINCS-256 scheme☆15Feb 23, 2016Updated 9 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 8 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- NAV M2M repository☆17Updated this week
- A nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.☆27May 1, 2017Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Using SGX to harden password hashing☆34Jan 17, 2016Updated 10 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Dec 22, 2025Updated last month
- Constant time big numbers for Go☆106Feb 26, 2025Updated 11 months ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- ☆10Feb 20, 2017Updated 8 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago
- An imgui implementation for nvn (the graphics library used by Nintendo Switch) that can be used with Nintendo Switch applications/games.☆11Mar 15, 2023Updated 2 years ago
- Zig guide made at HEIG-VD☆13Aug 20, 2024Updated last year
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Nov 11, 2020Updated 5 years ago
- ☆16Jul 31, 2025Updated 6 months ago
- Plan It, Say It, Nail It: Mastering Difficult Conversations☆11Aug 11, 2019Updated 6 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Collection of benchmarks for C++ Exception Handling☆10Apr 6, 2018Updated 7 years ago
- Mass Parallel Secure Shell command execution☆12Nov 9, 2025Updated 3 months ago
- Great Nodes for ComfyUI☆13Dec 4, 2025Updated 2 months ago
- Embedded Linux ReadTheDocs Project☆11Oct 1, 2023Updated 2 years ago
- My Privoxy configuration files☆27Apr 15, 2012Updated 13 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated 10 months ago
- A feature-rich Websocket IRC client in JavaScript☆12Dec 13, 2025Updated 2 months ago
- LLVM trunk with poolalloc trunk modified to compile only DSA☆12Jul 9, 2015Updated 10 years ago
- Faster integer compression in Go with SIMD using StreamVByte codec☆43Aug 15, 2023Updated 2 years ago
- Public release of the tools used to assist in gadget finding.